Skip to main content

Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks

  • Chapter
  • First Online:
Information Security Technologies in the Decentralized Distributed Networks

Abstract

An analysis of existing network security solutions shows that a promising direction is to improve traffic management and routing process that should consider network performance parameters and network security parameters that characterize the efficiency of network intrusion detection systems and analyze vulnerabilities and risks. A flow-based model of secure routing with load balancing has been developed with modified load balancing conditions and considering the probability of its compromise. It has been found that in the process of load balancing, links with a lower compromise probability are loaded more intensively, unloading more vulnerable from the point of view of links compromise.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gupta S (2018) Security and QoS in wireless sensor networks, 1st edn. eBooks2go Inc.

    Google Scholar 

  2. Kiser Q (2020) Computer networking and cybersecurity: a guide to understanding communications systems, internet connections, and network security along with protection from hacking and cyber security threats. Kindle Edition

    Google Scholar 

  3. Barreiros M, Lundqvist P (2015) QoS-enabled networks: tools and foundations. Wiley, New York

    Google Scholar 

  4. Dodd, A.Z.: The Essential Guide to Telecommunications (Essential Guide Series). Pearson. (2019)

    Google Scholar 

  5. Sheluhin O, Smolskiy S, Osin A (2007) Self-similar processes in telecommunications. Wiley, New York

    Google Scholar 

  6. Park K, Willinger W (eds) Self‐similar network traffic and performance evaluation. Wiley, New York

    Google Scholar 

  7. Lemeshko OV, Yevseyeva OY, Garkusha SV (2013) A tensor model of multipath routing based on multiple QoS metrics. In: 2013 International Siberian conference on control and communications (SIBCON) proceedings. IEEE, pp 1–4. https://doi.org/10.1109/SIBCON.2013.6693645

  8. Yeremenko O, Lemeshko O, Persikov A (2018) Secure routing in reliable networks: proactive and reactive approach. In: Shakhovska N, Stepashko V (eds) CSIT 2017. AISC, vol 689. Springer, Cham, pp 631–655. https://doi.org/10.1007/978-3-319-70581-1_44

  9. Lemeshko O, Yeremenko O, Yevdokymenko M, Shapovalova A, Hailan AM, Mersni A (2019) Cyber resilience approach based on traffic engineering fast reroute with policing. In: 2019 10th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS) Proceedings, vol 1. IEEE, pp 117–122 (2019). https://doi.org/10.1109/IDAACS.2019.8924294

  10. Medhi D, Ramasamy K (2017) Network routing: algorithms, protocols, and architectures. Morgan Kaufmann

    Google Scholar 

  11. Rak J, Hutchison D (eds) Guide to disaster-resilient communication networks (computer communications and networks), 1st edn. 2020 Edition. Springer, Berlin

    Google Scholar 

  12. Lemeshko O, Papan J, Yeremenko O, Yevdokymenko M, Segec P (2021) Research and development of delay-sensitive routing tensor model in IoT core networks. Sensors 21(11):1–23. https://doi.org/10.3390/s21113934

  13. Lemeshko OV, Yeremenko OS, Hailan AM (2016) QoS solution of traffic management based on the dynamic tensor model in the coordinate system of interpolar paths and internal node pairs. In: 2016 International conference radio electronics & info communications (UkrMiCo) proceedings. IEEE, pp 1–6. https://doi.org/10.1109/UkrMiCo.2016.7739625

  14. Lemeshko O, Yeremenko O (2016) Routing tensor model presented in the basis of interpolar paths and internal node pairs. In: 2016 third international scientific-practical conference problems of infocommunications science and technology (PIC S&T) Proceedings. IEEE, pp 201–204. https://doi.org/10.1109/INFOCOMMST.2016.7905381

  15. Lemeshko O, Yeremenko O, Yevdokymenko M, Radivilova T (2021) Research of the QoE fast ReRouting processes with differentiated R-factor maximization for VoIP-flows using the tensor model of the corporate telecommunication network. In: Vorobiyenko P, Ilchenko M, Strelkovska I (eds) Current trends in communication and information technologies. IPF 2020. Lecture notes in networks and systems, vol 212. Springer, Cham. https://doi.org/10.1007/978-3-030-76343-5_6

  16. Lemeshko O, Yeremenko O, Yevdokymenko M, Hailan AM (2021) Tensor multiflow routing model to ensure the guaranteed quality of service based on load balancing in network. In: Hu Z, Petoukhov S, Dychka I, He M (eds) Advances in computer science for engineering and education III. ICCSEEA 2020. Advances in intelligent systems and computing, vol 1247. Springer, Cham. https://doi.org/10.1007/978-3-030-55506-1_11

  17. Lee Y, Seok Y, Choi Y, Kim C (2002) A constrained multipath traffic engineering scheme for MPLS networks. In: 2002 IEEE international conference on communications. ICC 2002 (Cat. No.02CH37333) Proceedings, vol 4. IEEE, pp 2431–2436. https://doi.org/10.1109/ICC.2002.997280

  18. Norros I (1994) A storage model with self-similar input. Queueing Syst 16:387–396. https://doi.org/10.1007/BF01158964

    Article  MathSciNet  MATH  Google Scholar 

  19. Shah SA, Issac B (2018) Performance comparison of intrusion detection systems and application of machine learning to snort system. Futur Gener Comput Syst 80:157–170. https://doi.org/10.1016/j.future.2017.10.016

    Article  Google Scholar 

  20. Kron G (1965) Tensor analysis of networks. Wiley, New York

    Google Scholar 

  21. Akimaru H, Kawashima K (2012) Teletraffic: theory and applications. Springer Science & Business Media, Berlin

    Google Scholar 

  22. Yevdokymenko M, Yeremenko O, Shapovalova A, Shapoval M, Porokhniak V, Rogovaya N (2021) Investigation of the secure paths set calculation approach based on vulnerability assessment. In: Modern machine learning technologies and data science workshop. Proceedings of 3rd international workshop (MoMLeT&DS 2021), 2917, pp 207–217

    Google Scholar 

  23. Scarfone K, Mell P (2007) Guide to intrusion detection and prevention systems (IDPS). NIST special publication 800-94

    Google Scholar 

  24. Common Vulnerability Scoring System v3.0: Examples, Forum of Incident Response and Security Teams. https://www.first.org/cvss/examples

  25. Abedin M, Nessa S, Al-Shaer E, Khan L (2006) Vulnerability analysis for evaluating quality of protection of security policies. QoP ’06. https://doi.org/10.1145/1179494.1179505

  26. Peltier TR (2005) Information security risk analysis. CRC Press, Boca Raton

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oleksandra Yeremenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lemeshko, O., Yeremenko, O., Yevdokymenko, M. (2022). Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks. In: Oliynykov, R., Kuznetsov, O., Lemeshko, O., Radivilova, T. (eds) Information Security Technologies in the Decentralized Distributed Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 115. Springer, Cham. https://doi.org/10.1007/978-3-030-95161-0_10

Download citation

Publish with us

Policies and ethics